Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-24351 |
CWE-ID | CWE-367 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Vostro 5625 Hardware solutions / Firmware Vostro 5515 Hardware solutions / Firmware Vostro 5415 Hardware solutions / Firmware Vostro 3525 Hardware solutions / Firmware Vostro 3515 Hardware solutions / Firmware Vostro 3425 Hardware solutions / Firmware Vostro 3405 Hardware solutions / Firmware Vostro 16 5635 Hardware solutions / Firmware Vostro 15 3535 Hardware solutions / Firmware Vostro 14 3435 Hardware solutions / Firmware Inspiron 7415 2-in-1 Hardware solutions / Firmware Inspiron 7405 2-in-1 Hardware solutions / Firmware Inspiron 5515 Hardware solutions / Firmware Inspiron 5505 Hardware solutions / Firmware Inspiron 5425 Hardware solutions / Firmware Inspiron 5415 Hardware solutions / Firmware Inspiron 5405 Hardware solutions / Firmware Inspiron 3785 Hardware solutions / Firmware Inspiron 3585 Hardware solutions / Firmware Inspiron 3515 Hardware solutions / Firmware Inspiron 3505 Hardware solutions / Firmware Inspiron 16 7635 2-in-1 Hardware solutions / Firmware Inspiron 16 5635 Hardware solutions / Firmware Inspiron 15 3535 Hardware solutions / Firmware Inspiron 15 3525 Hardware solutions / Firmware Inspiron 14 7435 2-in-1 Hardware solutions / Firmware Inspiron 14 7425 2-in-1 Hardware solutions / Firmware Inspiron 14 5435 Hardware solutions / Firmware Dell G5 5505 Hardware solutions / Firmware Dell G15 5525 Hardware solutions / Firmware Dell G15 5515 Hardware solutions / Firmware Alienware m17 R5 AMD Hardware solutions / Firmware Alienware m15 Ryzen Edition R5 Hardware solutions / Firmware Alienware m15 R7 AMD Hardware solutions / Firmware |
Vendor | Dell |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU80878
Risk: Low
CVSSv4.0: 2.1 [CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-24351
CWE-ID:
CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to a time-of-check, time-of-use (TOCTOU) race condition. A local attacker can alter data and code used by the remainder of the boot process.
MitigationInstall update from vendor's website.
Vulnerable software versionsVostro 5625: before 1.12.1
Vostro 5515: before 1.18.1
Vostro 5415: before 1.18.1
Vostro 3525: before 1.13.0
Vostro 3515: before 1.15.1
Vostro 3425: before 1.13.0
Vostro 3405: before 1.15.1
Vostro 16 5635: before 1.6.1
Vostro 15 3535: before 1.6.0
Vostro 14 3435: before 1.6.0
Inspiron 7415 2-in-1: before 1.18.1
Inspiron 7405 2-in-1: before 1.14.2
Inspiron 5515: before 1.18.1
Inspiron 5505: before 1.13.2
Inspiron 5425: before 1.12.1
Inspiron 5415: before 1.15.0
Inspiron 5405: before 1.13.2
Inspiron 3785: before 1.15.0
Inspiron 3585: before 1.15.0
Inspiron 3515: before 1.15.1
Inspiron 3505: before 1.15.1
Inspiron 16 7635 2-in-1: before 1.6.1
Inspiron 16 5635: before 1.6.1
Inspiron 15 3535: before 1.6.0
Inspiron 15 3525: before 1.13.0
Inspiron 14 7435 2-in-1: before 1.6.1
Inspiron 14 7425 2-in-1: before 1.12.1
Inspiron 14 5435: before 1.6.1
Dell G5 5505: before 1.17.2
Dell G15 5525: before 1.11.1
Dell G15 5515: before 1.14.0
Alienware m17 R5 AMD: before 1.11.1
Alienware m15 Ryzen Edition R5: before 1.15.0
Alienware m15 R7 AMD: before 1.11.1
CPE2.3Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.